CVE Alert: CVE-2025-10624 – PHPGurukul – User Management System

CVE-2025-10624

HIGHNo exploitation known

A security flaw has been discovered in PHPGurukul User Management System 1.0. This affects an unknown function of the file /login.php. Performing manipulation of the argument emailid results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.

CVSS v3.1 (7.3)
Vendor
PHPGurukul
Product
User Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-17T22:32:11.654Z
Updated
2025-09-17T22:32:11.654Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection on login.php with unauthenticated access and a public PoC; action required.

Why this matters

Auth-bypass risk is real: attacker can potentially read or alter user data, and undermine account integrity without user interaction. The exposure of a public login endpoint increases the likelihood of automated scanning and exploitation across organisations using PHPGurukul User Management System.

Most likely attack path

Attackers can reach the login page over the network and supply crafted input in the emailid parameter. With no authentication and network-level access, the vulnerability may be exploited directly to leak or modify data (C, I, A impact). The vulnerability’s post-exploitation scope remains potentially local to the app’s database, but could enable broader data exposure or credentialHarvest attempts if the DB user permissions are lax.

Who is most exposed

Public-facing deployments of PHPGurukul User Management System, typically on shared hosting or SME web stacks, where login forms are internet-accessible and error handling may reveal databases details.

Detection ideas

  • Logs showing unusual emailid payloads or SQL error messages from login.php
  • spikes in login attempts or anomalous authentication failures without user interaction
  • WAF alerts for SQLi patterns targeting login.php
  • Outbound data exfiltration indicators post-auth attempts
  • Database query logs showing concatenated SQL in login handling

Mitigation and prioritisation

  • Patch to a fixed version or apply vendor-provided containment for login.php; verify vendor advisories.
  • Implement parameterised queries/prepared statements and strict input validation on emailid.
  • Harden database permissions for the web-app user; restrict to least-privilege.
  • Enable verbose error suppression and centralised logging; monitor for SQL error leakage.
  • Deploy web application firewall rules targeting SQL injection patterns; rate-limit login endpoints.
  • If KEV is true or EPSS ≥ 0.5, treat as priority 1; otherwise treat as high. Further uncertainty remains without KEV/EPSS data.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.